STE WILLIAMS

8 Holiday Security Tips for Retailers

Here’s how retailers can protect their businesses from attackers and scammers hoping to wreak havoc during the most wonderful time of the year.PreviousNext

Image Source: Maryna via Adobe Stock

Image Source: Maryna via Adobe Stock

Another Halloween is in the books, Thanksgiving is only four weeks away, and, before you know it, the Christmas rush will be in full swing.

Once again, the holiday season is upon us, and for retailers, especially, that means an especially busy time. Online sales, for example, are expected to jump 14% to 18% this year compared to 2018, according to the 2019 Deloitte holiday retail survey.   

The holiday season is also a time for retailers to be proactive about security. Among the highest risk factors, according to Muktar Kelati, director of intelligence operations for the Retail Hospitality ISAC (RH-ISAC), are employee negligence or poor security hygiene, unpatched vulnerable systems, misconfiguration or poor security of publicly accessible online resources, and older point-of-sale (POS) systems.

“The industry has realized that security is a broad problem that requires a multifaceted approach from not only the retail sector, but the financial sector that issues and manages the payment infrastructure, as well as supply chain partners, third-party service providers, the major technology players and the public sector,” Keltai says.

Retailers also should be on the lookout for ransomware attacks, including those tied to distributed denial-of-service (DDoS) attacks, adds Adam Levin, founder of CyberScout.

“Small retailers are also vulnerable,” he says. “They often don’t have the training, budget, or resources, but it’s important to keep in mind that no business is too small or unimportant for a hacker.”

With that as a backdrop, retailers can use these eight security tips to prepare for the holiday rush. Have a safe and prosperous season.

 

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full BioPreviousNext

Article source: https://www.darkreading.com/threat-intelligence/8-holiday-security-tips-for-retailers--------------/d/d-id/1336224?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Google Patches Chrome Zero-Day Under Active Attack

The fix addresses CVE-2019-13720, a high-severity, use-after-free vulnerability discovered by Kaspersky Lab researchers.

Google upped the ante for Halloween frights when it issued a Chrome browser update to patch two vulnerabilities, one of which is a high-severity zero-day being actively exploited in the wild.

Chrome version 78.0.3904.87 is for Windows, Mac, and Linux, and it will roll out over the coming days and weeks. It includes security fixes for CVE-2019-13721 and CVE-2019-13720, both of which it classifies as high-severity. “Google is aware of reports that an exploit for CVE-2019-13720 exists in the wild,” Google’s Srinivas Sista wrote in a blog post on the update.

The vulnerability under attack is a use-after-free bug, a type of memory corruption flaw that attackers could use to execute malicious code. Google credits Anton Ivanov and Alexey Kulaev of Kaspersky Lab with discovering CVE-2019-13720, which the researchers reported on Oct. 29.

“Access to bug details and links may be kept restricted until a majority of users are updated with a fix,” Sista said. “We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed.”

The DHS Cybersecurity and Infrastructure Security Agency has issued an advisory on the patches, encouraging users and admins to review Chrome’s release and apply the updates.

Read more details here.

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “Is Voting by Mobile App a Better Security Option or Just ‘A Bad Idea’?.”

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/google-patches-chrome-zero-day-under-active-attack/d/d-id/1336244?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Details of Attack on Electric Utility Emerge

The March 5 DDoS attack interrupted communications between generating facilities and the electrical grid in three western states.

For the first time, a malware attack is known to have caused service disruptions of the power grid in three states. The March 5 distributed denial-of-service (DDoS) attack against a Salt Lake City-based renewable energy developer triggered communications outages over the course of 12 hours that affected electric utilities in Utah, Wyoming, and California.

The event, triggered by a DDOS attack against sPower — which claims to be the biggest private solar power operator in the United States — temporarily cut grid visibility to roughly 500 megawatts of generating capacity from a dozen solar and wind-power sites.

An unpatched vulnerability in sPower’s Cisco firewalls was the target of the attack, which, although affecting communications within the grid, did not cause service interruptions to any customers.

For more, read here, here, and here.

This free, all-day online conference offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. Click for more information and, to register, here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/details-of-attack-on-electric-utility-emerge/d/d-id/1336245?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Free & Discounted Security Services Now Available for US Election Orgs

Nonprofit Defending Digital Campaigns (DDC) offers security services for email, user education, mobile, and encrypted communications, to federal election committees.

A nonprofit co-founded by former campaign managers for Hillary Clinton and Mitt Romney officially launched this week to provide free or low-cost security technology and services to federal election campaigns.

Defending Digital Campaigns (DDC) basically acts as an intermediary to negotiate software licenses and service contracts from security vendors and providers and to ensure the tools are properly installed and used.

DDC initially is offering registered political party committees and federal candidates email security services from Agari, anti-phishing services from Area 1 Security, online IT security training from Cybrary, security behavior change services from Elevate Security, managed security services from GRA Quantum, mobile endpoint security software from Lookout, and end-to-end encrypted messaging services from Wickr.

Michael Kaiser, DDC’s president and CEO, says the nonprofit will package some of the security services for election organizations. “We will also create groups of products specifically for campaigns,” he says.

Election security overall has been a hot button topic in the wake of Russia’s election-meddling and hacking voter rolls during the 2016 presidential election cycle, as well as subsequent research demonstrating major security holes in voting systems and equipment. Security experts say Web-based election systems are the most likely and easiest targets for attack during the elections: Election-reporting websites, voter roll websites, and candidate websites all are at risk of disruption via distributed denial-of-service (DDoS) attacks, as well as hacking and data-tampering by nation-state or other attackers.

It’s easier for an attacker to remotely penetrate a public-facing website to DDoS it, deface it, alter information (such as changing vote count data or polling place information), or access sensitive data stored on its back-end servers than to bother tampering with a voting machine. 

Romney Clinton Campaign Roots
DDC was founded by Matt Rhoades, former campaign manager for Mitt Romney, and Robby Mook, former campaign manager for Hillary Clinton, whose organizations both experienced cyberattacks during their campaign tenures. For now the nonprofit is focused on the federal level of election organizations; it received approval in May from the Federal Election Commission (FEC) to offer the free and discounted cybersecurity services in order to help beef up US election security.

“The campaign ecosystem … from my perspective has gotten less attention than the voting machine issue,” DDC’s Kaiser says. “Campaigns have to understand, like other businesses, they are a target — for nation-states, hacktivists, and cybercriminals after high-wealth individuals and donor information.”  

One example of the cyber-risk to federal elections was the 2016 discovery by Recorded Future of a data breach of the US Election Assistance Commission (EAC), which tests and certifies voting equipment, runs a clearinghouse on elections, and provides the National Voter Registration form. A Russian hacker was spotted looking for buyers for the credentials to the EAC database two weeks before the election. Levi Gundert, vice president of intelligence and risk at Recorded Future, says that attack was a red flag.

“EAC is where voting administrators go to get the latest updates they need to administer their voting centers,” he explains. “A lot of times they’re downloading [data] and taking it on thumb drives to sneakernet to voting machines. There’s absolutely the potential to plant something malicious.”

Joseph DePlato, security researcher and co-founder and CTO of Bluestone Analytics, says secure campaigns are key to ensuring voters get accurate and sufficient information.

“I’m hoping [DDC] will be a catalyst for better security and visibility across the entire spectrum of election technologies and processes,” he says. “From a voter point of view, I’m concerned with the actual election security versus the campaign security. For example, if voting machines can be compromised and votes changed, that is a direct threat to democracy that should concern every citizen.”

But if a campaign is compromised, he says, nation-states could abuse breached documents to wage a social-media influence attack. “But there is no direct threat to local voting machines or processes,” he says.

Security vendors traditionally have struggled with how to assist federal election organizations, notes Joel Wallenstrom, CEO of Wickr. “A lot of companies have been trying hard to help out with this problem, but they mostly ran into brick walls,” he says. “You had to understand the political processes” and how to get FEC approval in accordance with campaign finance laws. Working via DDC paves the way for security vendors to offer security help to federal election committees, he says.

DDC is not yet publishing specific discounts for the security products it’s offering, but says some are free and others are discounted as deeply as 50% or more. All registered national political party committees and federal candidate committees are eligible for cybersecurity help via DDC, as is a House candidate committee with a minimum of $50,000 in receipts for the current election cycle, a Senate candidate committee with a minimum of  $100,000 in receipts for the current election cycle, and a presidential candidate’s committee if he or she is polling above 5% in national polls.

Kaiser says the DDC currently has a few House of Representatives’ campaigns as its early adopters, and he expects things to ramp up in early 2020 in the run-up to the fall election. “Our initial focus is on the network of people running campaigns every day for committees and parties and to understand their needs,” he says.

Meanwhile, several cybersecurity vendors, including big-name vendors like Google, Microsoft, Cloudflare, and McAfee, in the run-up to the 2018 election offered free security services, such as website and user-account protection services to state and local election jurisdictions and campaigns. 

Up Next: MFA
Among the next technologies DDC hopes to add is multifactor authentication (MFA), according to Kaiser.

That plays into the attacks that occurred in the 2016 election. “In part we’re informed by what we saw in the last election, so it’s going to be a lot of basic blocking and tackling [at first],”  Wickr’s Wallenstrom says. “Having two-factor authentication out there, people understanding it’s smart to update the operating system on their devices,” for example, he explains.

DDC, meanwhile added new members to its board this week: Ron Gula, president and co-founder of Gula Tech Adventures; Alan Blue, co-founder of LinkedIn; and Suzanne Spalding, former DHS undersecretary for the National Protection and Programs Directorate (NPPD). They join DDC board chair and co-founder Debora Plunkett, former director of the NSA Information Assurance Directorate. 

Related Content:

This free, all-day online conference offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. Click for more information and, to register, here.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise … View Full Bio

Article source: https://www.darkreading.com/cloud/free-and-discounted-security-services-now-available-for-us-election-orgs/d/d-id/1336247?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Hackers plead guilty to breach that Uber covered up

Remember when Uber was hacked but paid the hackers $100,000 in hush money to delete the data and zip their lips about it?

The two guys who did the hack, they’re going down.

Brandon Charles Glover, 26, of Florida, and Vasile Mereacre, 23, of Toronto, each pleaded guilty on Wednesday in a San Jose court house in California to one charge of conspiracy to commit extortion involving computers. Specifically, they pleaded guilty to stealing companies’ personal information that was stored on Amazon Web Services from October 2016 to January 2017 and then demanding money to destroy their copies of the data.

They each face up to five years in prison and a fine of $250,000 and will be sentenced in March 2020. Maximum sentences are rarely handed out.

With the guilty pleas, Uber’s elaborate coverup has been dragged back into the limelight.

The data of 57 million drivers and customers was stolen in the 2016 data breach. Uber not only kept the breach secret from the victims, it also paid $100,000 in hush/delete-the-data money, as in, $50,000 to each of the two crooks.

Uber paid off crooks whose identities it had already figured out

This was after the company had already discovered Glover’s true identity, sent an Uber rep down to Florida to meet with him and get him to sign a nondisclosure agreement in his true name on 3 January 2017, and, two days later, likewise sent a rep to a restaurant in Toronto to meet with Mereacre and get him to sign an NDA in his real name, too.

It wasn’t until 10 months later, in November 2017, that Uber told riders and drivers that it had lost control of their personal information and that it had fallen into the hands of crooks. The company not only hid the breach from those affected, but also from the Federal Trade Commission (FTC) while the watchdog was investigating Uber over a separate database hack, from 2014.

Both the 2014 and the 2016 hacks were made possible by the same exact security fail: in both breaches, Uber’s engineers left the keys to the castle – a key to Amazon Web Services S3 cloud servers – sitting around, publicly available, on GitHub.

According to the Department of Justice (DOJ), they actually used their success with Uber as a selling point. When trying to extort the LinkedIn-owned education company Lynda, the hackers said:

[P]lease keep in mind, we expect a big payment as this was hard work for us, we already helped a big corp which paid close to seven digits, all went well.

LinkedIn didn’t play ball. Instead, it tried to identify the extortionists and called in the cops.

US Attorney David Anderson was none too impressed by Uber’s attempt to sweep the attack under the rug. From a statement:

Companies like Uber are the caretakers, not the owners, of customers’ personal information.

What gets stolen in a computer extortion belongs to your neighbors, not to yourselves. Don’t be so concerned with your image or reputation. Be concerned with the real losses others have suffered. Report the intrusion promptly. Cooperate with law enforcement.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/5jZvM2TMsYc/

Twitter bans political ads

Machine learning-based optimization of messaging and micro-targeting! Fake and misleading news! Deep fakes! All coming at us like a nonstop barrage of communication-twisting bullets, with what Twitter CEO Jack Dorsey says is “increasing velocity, sophistication, and overwhelming scale.”

He was talking about “new challenges to civic discourse,” giving the rationale behind Thursday’s announcement that Twitter’s banning political ads.

It’s not just political ads that are affected by the list of weirdnesses that have flown out of the Pandora’s box of artificial intelligence (AI) mixed with social media technologies. He was talking about all internet communications, Dorsey said. But it’s best for Twitter to focus on the “root problems” – what it can fix, “without the additional burden and complexity taking money brings,” he said.

Trying to fix both means fixing neither well, and harms our credibility.

Twitter’s gathering input on how to shape the new policy, which will ban candidate ads and issue ads. Dorsey:

It isn’t fair for everyone but candidates to buy ads for issues they want to push. So we’re stopping these too.

The policy will make a few exceptions, including one for ads that promote voter registration. Dorsey promised that the final policy will be out by 11 November, and that enforcement will begin on 22 November – a bit of breathing room for current advertisers to process the change.

This isn’t about free speech

Dorsey said that this “isn’t about free expression.” Rather, it’s “about paying for reach.” And paying to increase the reach of political speech has “significant ramifications that today’s democratic infrastructure may not be prepared to handle,” he said. “It’s worth stepping back in order to address.”

BBC media editor Amol Rajan said,

Political ads on Twitter are just a fraction, in scale and impact, of those on Facebook. Mr Dorsey knew – and his chief financial officer has since confirmed – that this decision would have little impact on the company’s bottom line.

They therefore calculated that they could win a thumbs up from regulators and public opinion at little cost to the business.

It’s certainly a decision that sets Twitter up as the polar opposite of its rival social media platform, Facebook. It’s anybody’s guess whether Twitter’s political ad ban is meant as a punch in the gut, but the timing is certainly interesting.

Not only does it come in the politics-infused lead-up to November elections, but it was timed to hit right before Facebook’s earnings call and comes exactly two weeks after Facebook said that it’s quite possible that it would allow lying or misleading political ads to run without taking them down.

Want to post not-entirely-true political ads? Facebook’s your spot!

Last week, Facebook leader Mark Zuckerberg appeared on Capitol Hill to talk to lawmakers about his pet cryptocurrency project, Libra. Lawmakers took the opportunity to grill him about, and to slam, Facebook’s policy of not removing posts that contain misleading or bogus claims.

Zuckerberg said that Facebook would “probably” allow candidates to buy ads that lie about their opponents. Facebook doesn’t fact-check such ads because it thinks that in a democracy, “people should decide what’s credible, not tech companies,” Zuckerberg said.

Reacting to Twitter’s move, Zuckerberg reiterated Facebook’s rationale in a conference call with journalists:

In a democracy, I don’t think it’s right for private companies to censor politicians or the news.

He said that rather than getting rid of political ads altogether, the focus should be on ad transparency and estimated that ads from politicians will account for less than 0.5 percent of the company’s revenue next year.

Let’s all become politicians and pimp fakery

Love your thinking, said a San Francisco man who registered as a candidate in California’s 2022 gubernatorial election. He doesn’t want to be governor, he says. He just wants to run fake Facebook ads.

Adriel Hampton, political activist and owner of a media marketing firm, registered his candidacy at a local post office on Monday morning. He told CNN that he’ll be running fake ads on Facebook about President Trump, Zuckerberg, other Facebook executives, and Twitter executives.

He’s already begun, but not as a candidate. Last Thursday, “The Really Online Lefty League” PAC began running a fake ad on Facebook. The ad spliced together audio of Senator Lindsey Graham saying that he backed the Green New Deal. (He does not). The ad was canceled on Saturday after having been flagged by Facebook’s fact checkers, but the video was left up.

Facebook wouldn’t have taken down the ad if it were posted by a politician, it told CNN. Hence, The Really Online Lefty League now has itself a registered political candidate who can post whatever nonsense he likes – a sharp critique of Facebook’s laissez-faire approach to political ads.

Here’s Hampton, who’s the treasurer of The Really Online Lefty League:

The whole thing here is that Facebook doesn’t know what it is doing, and neither does Congress.

I honestly expected that after the news attention to [the exchange no Capitol Hill between Zuckerberg and Rep. Alexandria Ocasio-Cortez], it wouldn’t be approved. But Facebook really isn’t doing anything proactive about misinformation on their platform.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/4ojwnOWi26U/

Happy Birthday, CVE!

It was October 1999. Macs had just got embedded Wi-Fi, Napster had launched, and Yahoo had purchased Geocities for $3.6bn. Something else happened that escaped most computer users at the time: CVE posted its first bug. The Common Vulnerabilities and Exposures (CVE) system is 20 years old this week.

Created by the non-profit Mitre Corporation, which oversees several federal government programs, CVE provides common identifiers for cybersecurity bugs, making them easier to track and fix.

Back then, most cybersecurity bug tracking tools used their own databases and their own IDs for bug tracking. That made it difficult for people to collaborate on reporting and fixing them. CVE fixed this using its bug numbering system.

The CVE list couldn’t have come at a better time – 1999 was the year that widespread malware infections really took off. The CIH virus that appeared the year before dropped its first payload in 1999, In March, the Melissa worm devastated Office users’ machines around the world, setting the record for the most powerful malware so far.

The list started small but has grown to contain over 125,000 vulnerabilities. NIST’s National Vulnerabilities Database (NVD) is based on it, and Mitre also mines the vulnerabilities to produce a list of broader cybersecurity weakness categories known as the Common Weakness Enumeration.

The CVE’s success also presents new challenges. For years, the list grew at a modest rate, adding between 4,000 and 8,000 new bugs each year. Then in 2017, things exploded with a 128% spike in new bugs. A year-on-year growth rate of just 12% in 2018 may be more modest, but it also suggests a new normal in which bug reports now top 10,000 each year.

Mitre has strained under the weight of this extra work. Even before the massive 2017 spike, there was a reported slowdown in processing. Congress investigated and found that inconsistent funding was hindering the program. It recommended a change in the funding structure, along with biennial reviews.

Mitre has responded by expanding its operations to produce a more federated management approach.

When someone discovers a bug they can ask a CVE Numbering Authority (CNA) to give it an ID number. It then combines that with a description and any associated references to create a CVE entry which is added to the list. Mitre is the root program CNA, but there are others, and it has expanded this community to cope with growing demand. In 2016 there were 22 CNAs. Today, there are 104, including 5 CERTs, 2 bug bounty programs, and 9 individual security researchers.

As the number and diversity of bugs grows, a central, standard way to name and track them will be more important than ever. It’s difficult enough meeting this challenge even with a central list. Imagine what things would be like if we were all still using our own naming systems and documenting bugs in hundreds of individual silos?

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/vrPGAuEivhc/

Belgian city slurps mobile data to track visitors

Updated The Belgian city of Kortrijk in West Flanders is using data provided by a mobile phone company to count the number of people present in the town and where they come from.

Even more worryingly, local public-service broadcaster VRT has reported that city officials will try to cross-reference this data with credit and debit card databases.

Kortrijk is a popular tourist destination: between July and August, 799,336 people visited the town, almost 20,000 a day when students, employees and residents are excluded.

According to VRT, the city is paying telco Proximus €40,000 a year for data on how many phones are in each part of the city, presumably using cell location data. Proximus then apparently extrapolates data for the rest of the area while taking into account subscribers to other networks and those without mobile phones. We’ve asked both Proximus and local city officials for comment*.

But the Belgian data protection regulator has told The Register that, contrary to reports, it had not approved the scheme and was examining whether or not it breaks Belgian data protection law.

In an email, a spokesperson said:

We did not approve the tracking of mobile phones in Kortrijk. The Privacy Commission (the predecessor of the Belgian Data Protection Authority) had reacted positively to a similar project in 2016; that was three years ago and was not about this precise case. We have heard concerns from citizens about this project, therefore we will look into it. We cannot comment further at the time because we do not have all the details about the project and the processing.

The data will be collected once every three months and analysed to improve marketing campaigns for tourism and commerce.

Data provided to the city apparently includes the nationality of the subscriber or the province or even municipality within Belgium they come from.

The intention is that city hall will then cross-reference this with data from Visa and debit card companies to see how much people are spending. VRT said the first results show sales days bring in more visitors – 49,000 for Whit Sunday. Of these, 79 per cent of local visitors were from West Flanders, 4.82 per cent came from Hainault, and 1.53 per cent from Antwerp. Of foreign visitors, half were French and 14 per cent Dutch.

It also emerged yesterday that the statistics authority in Spain (Instituto Nacional de Estadística, INE) is planning to track every mobile handset in the country that uses the three largest network providers – Movistar, Vodafone and Orange – over a period four days in November.

Between 18 and 21 November, mobile subscribers will be counted and their location logged. A further four days of data slurping are already planned for Christmas and next summer.

Spanish citizens have been assured the data will be anonymous and aggregated.

To ensure anonymity, the INE has divided the country into cells with a minimum of 5,000 inhabitants. So Madrid is made up of 128 cells while in rural areas the individual cells will stretch for miles.

Location checks will be made between midnight and 6am to establish a place of residence, and again between 9am and 6pm when subscribers are assumed to be at work. To account for shift workers, locations will also be checked at six specific points during the day – 6am, 10am, 2pm, 6pm, 10pm and 2am.

The aim is to provide information on numbers of people commuting from dormitory towns into municipal centres and those staying near home for work.

Researchers also hope to gain a better understanding of so-called “empty Spain” – the swathes of rural countryside suffering severe depopulation. The institute will run similar checks for two days in the summer and on Christmas Day to check holiday movements.

The INE is confident that no data laws will be breached by the mass surveillance because the data is genuinely anonymised. It also notes that similar questions are asked in the Spanish census.

An INE mouthpiece told The Register (courtesy of Google Translate):

The INE is conducting a study based on data from mobile phones to incorporate them into the mobility information it offers traditionally in the Population and Housing Census.

The methodology of the study divides the national territory into about 3,200 cells, each of they with at least 5,000 residents. For each cell, the INE will receive information from all three Spain’s main mobile phone operators on how many terminals are they find in that cell at various times of the day.

This information will be limited to a terminal count that will be provided to the INE [in the] form of aggregate tables of results. Operators will not provide individual data on telephone numbers, or on the holders of the lines, so that under no circumstances will the INE be able to track the position from any terminal.

The INE wants to emphasise that it is a submitted statistic, like all that it produces, to the Law on Public Statistical Function, which guarantees statistical secrecy and that complies with all the requirements of the Data Protection Law.

An El Pais report is here, in Spanish. ®

* Updated at 0900 on 1 November to add

City officials got in touch with The Reg to say (translated): “We do not collect the data itself but get reports from Proximus. These reports are completely anonymous and only show how many people have visited our town and from what country, or city.

We could never track anyone individually and would never want to.

Thus, only streams of visitors larger than 30 people are counted by Proximus.

So [for example] if there are 250 people from Antwerp who visit our city on a Monday, we’ll know; if only 28 did, we will not.”

Such reports “allow us to spend our marketing resources more efficiently and see whether certain campaigns work or not.

“How many people really go car-free on a Sunday? Is it worth publishing [a campaign article] in a Walloon magazine or is it a waste of money? Moreover, we also use this data to better solve complex mobility issues.”

It did not respond to a question about payment data cross-referencing.

Sponsored:
Your Guide to Becoming Truly Data-Driven with Unrivalled Data Analytics Performance

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/10/31/belgian_town_track_every_mobile_user/

US Air Force inks deal with Raytheon on Windows 10 (and other) support for ARSE

The US Air Force (USAF) has declared it is awarding a contract to Raytheon thanks to its pressing need for “full ARSE compatibility”, including Windows 10 support, with equipment designed for maintaining fighter jet missiles.

Raytheon Missile Systems will be the proud beneficiaries of the USAF’s latest Advanced Medium Range Air-to-Air Missile Remote Support Equipment (ARSE) contract.

Ay arr ess ee. There it is on the US govt website

Click to enlarge

A modern air-to-air missile is a reasonably advanced piece of computing hardware and software. Every so often it needs booting and testing to make sure all is well – and that’s where ARSE enters the picture.

“The contractor shall integrate the necessary software for full ARSE functionality on Government Furnished Equipment (GFE) ARSE systems, ensure the GFE ARSEs are compliant with Government IA, IT, and security regulations for systems used in classified locations and conduct checkout and validation of GFE ARSE systems for delivery to the government,” states the text of the contract notice.

The unfortunate abbrev seems to have crept in through a portmanteau’ing of Advanced Medium Range Air-to-Air Missile, commonly shortened to AMRAAM, and Remote Support Equipment. ARSE. AMRAAM is a family of American-made missiles for fighter jets. Without going into Top Gun levels of geekery, they’re used for shooting down other aeroplanes at middling distances.

A pile of 5.25inch floppy disks

Good news – America’s nuke arsenal to swap eight-inch floppy disks for solid-state drives

READ MORE

The UK is buying 200 of them to hang off its F-35B Lightning fighter jets, though there is no news on whether there’s an ARSE package coming with the missiles.

When we went on Google and unwisely entered the search term “Raytheon arse”, the results contained a number of links to bitch-at-your-former-employer site Glassdoor. ®

Sponsored:
Your Guide to Becoming Truly Data-Driven with Unrivalled Data Analytics Performance

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/11/01/us_air_force_awards_deal_raytheon/

Move along, nothing to see here: Auditors say £100k grant to Hacker House was ‘appropriate’

A £100,000 government grant to Jennifer Arcuri’s infosec training business, Hacker House, has been flagged as “appropriate” following an investigation.

The Department for Digital, Culture, Media Sport (DCMS) awarded the money to the business in October 2018 under the Cyber Skills Immediate Impact Fund (CSIIF). However, the grant has been placed under heavy scrutiny since it emerged Arcuri had a close friendship with prime minister Boris Johnson.

The Government Internal Audit Agency (GIAA) opened a review into the award after it was revealed the cash, intended for UK businesses, had been given to Arcuri after she relocated to America. That was published yesterday evening (PDF).

It concluded: “In respect of the grant award to Hacker House Ltd, the assessment of eligibility and subsequent award of a reduced value of £100,000, is considered appropriate.”

Arcuri’s firm initially applied for £273,000 but was eventually granted £100,000, it revealed.

The review said the company’s application recorded its annual income as £0, adding that the figure was found to be inaccurate because bank statements submitted with the application provided evidence of income during the previous financial year. “However, the level of annual income was still less than the gateway requirement.”

While the eligibility and subsequent reduced grant awarded to Hacker House were deemed appropriate, the review said there were some areas where questions on the grant application form “would have benefitted from being clearer e.g. defining ‘limited trading history’ … and a breakdown of the roles of staff employed by the lead organisation”.

Tom Watson MP, Labour’s Shadow Secretary of State for Digital, Culture, Media and Sport, said the review was “a complete whitewash”.

“The documents published raise more questions than we had before.

“No one reading Hacker House’s grant application would give the company a penny, let alone £100,000 of taxpayers’ money.

“The fundamental question of why Hacker House was ever given this grant remains unanswered. The public deserve to know why their money was handled so irresponsibly. We will not let this lie.”

A DCMS spokesman said: “An independent review has concluded the eligibility and subsequent grant award to Hacker House Ltd was appropriate.

“Companies House records show Hacker House had a registered UK address when the grant was awarded and this was verified by the DCMS as part of the application process. The conditions of the grant were clear that initiatives must be carried out in England and this was the case with the Hacker House award.”

The co-founder of Hacker House was last seen on these pages back in 2017 arguing against former government policy consultant Rohan Silva, who was advocating for law enforcement to be given access to end-to-end encrypted comms. ®

Sponsored:
Your Guide to Becoming Truly Data-Driven with Unrivalled Data Analytics Performance

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/11/01/gov_100k_grant_to_hacker_house_appropriate_say_auditors/